Improvements in the detection of TWACS outbound message signals. A first improvement involves matching some (or all) of the intermediate points in an outbound preamble occurring between bits of the preamble currently being detected. This reduces the possibility of a false synchronization and therefore decreases the probability of missing outbound message signals. A second improvement is to require some or all of the known preamble bits to exceed a predetermined threshold where both the thresh-old and which bits are adjustable. An additional approach is using 4-8 additional buffers in a transponder to detect preamble patterns in the outbound message. Each half cycle of the outbound message waveform requires entering a bit only into the buffers active for the particular frame of reference in which the message is being transmitted, since only buffers for that frame of reference are employed. The process continues until all bits specified to be sent, based on the length of the outbound message, are extracted. A CRC is then performed for the message. Using this method eliminates the problem of inbound messages being detected as outbound messages, and the resulting “blindness” of the transponder. It further makes the transponders less sensitive to noise which currently causes the transponder to detect a preamble when there is none, resulting in a valid outbound message being missed.
|
1. In a two-way automatic communications system used by an electrical utility in which outbound messages are sent from the utility to an end device and inbound reply messages are sent from the end device back to the utility, the respective outbound and inbound messages being sent and received over the utility's power distribution system, a method for enabling a transponder to distinguish an outbound message from an inbound message of the outbound and inbound messages transmitted elsewhere on the two-way automatic communications system, comprising:
detecting a plurality of bits forming a preamble of the outbound message and extracting the plurality of bits, said detecting including detecting intermediate values included in a sequence of the plurality of bits in the preamble;
computing a ratio of signal strength for bit locations in the preamble where one bit value is expected to the signal strength for bit locations in the preamble where another bit value is expected; and,
accepting the plurality of bits as a valid preamble for the outbound message if the computed ratio exceeds a predetermined value.
14. In a two-way automatic communications system used by an electrical utility in which outbound messages are sent from the utility to a consumer and inbound reply messages are sent from the consumer back to the utility, the respective outbound and inbound messages being sent and received over the utility's power distribution system, a method for enabling a transponder to distinguish an outbound message from an inbound message of the outbound and inbound messages transmitted elsewhere on the two-way automatic communications system, comprising:
detecting a plurality of bits forming a preamble of the outbound message and
extracting the plurality of bits, said detecting including detecting intermediate values included in a sequence of plurality of bits in the preamble;
computing a ratio of signal strength for bit locations in the preamble where a “0” bit is expected to the signal strength for bit locations in the preamble where a “1” bit is expected; and,
accepting the sequence of plurality of bits as the preamble for the outbound message if:
a) all of the “1” bits in the preamble are of a correct sign;
b) the value of all the sequence of bits fall into a correct range of values for bit strength; and,
c) a ratio
exceeds a predetermined threshold value
wherein Z comprises a set of bit locations in the preamble where the signal amplitude is expected to be near zero, N comprises a set of bit locations in the preamble where the signal amplitude is expected to be non-zero, and di an absolute value of the received signal at an index i, wherein i is an integer.
2. The method of
3. The method of
4. The method of
5. The method of
where Z comprises a set of bit locations in the preamble where the bits of the one value occur, N comprises a set of bit locations in the preamble where the bits of the other value occur, and di is a received signal strength at an index i; if the ratio does not exceed a predetermined threshold value, the plurality of bits are rejected as not a valid outbound message preamble.
6. The method of
8. The method of
9. The method of
10. The method of
where yn,j, yn,k, and yn,l are the average signal amplitudes for various synchronization points of the plurality of possible points of synchronization on the waveform,
where i,n,k,l are integers.
11. The method of
12. The method of
13. The method of
yn=xn+αyn−1 where α is an averaging constant xn is an input of the recursive filter yn−1 as a previous average signal amplitude and yn is a current average signal amplitude.
|
This application is the United States National Stage under 35 U.S.C. §371 of International Application Ser. No. PCT/US2008/060731 having an International Filing Date of Apr. 18, 2008, and is related to and claims priority to U.S. Provisional Patent Application No. 60/913,612, filed on Apr. 24, 2007 which are incorporated herein by reference.
N/A
This invention relates to a two-way automated communications system (TWACS) used by electrical utilities for sending messages from the utility to an end device, and for receiving and processing responses from the end device containing information relating to matters such as current energy consumption, power outages, etc. More specifically, the invention sets forth a method for improvement in the detection for outbound messages sent by the utility.
TWACS messages, which can be categorized as either outbound messages (OM) or inbound messages (IM), are sent and received over a selected phase (φ) of the electrical distribution system. When an outbound message is sent, the transponder detects the message and validates it using channel coding. As discussed hereinafter, synchronization to the outbound message signal involves matching a 9-bit preamble of the message against an expected bit pattern. It will be understood that synchronization does not necessarily mean the message detected by the transponder will pass error detection as part of the channel coding. Furthermore, because the entire message has not yet been received at the time of synchronization, the transponder must continue to detect bits until the end of the message is received. If the transponder erroneously detects what appears to be a preamble, it will attempt to detect the bits following the preamble, even if no signal is present. This can result in the missed detection of an outbound signal that occurs while the transponder is in the bit detection state.
Sometimes an erroneous preamble detection can be triggered in a transponder by random noise on the power line, but a far more likely cause is TWACS inbound signals. There is sufficient similarity between TWACS inbound signals and TWACS outbound signals that an inbound signal can contain a bit pattern that matches the preamble of an outbound message. Depending on system configuration, it is possible for such patterns to occur immediately before an outbound message is sent over the same phase as a particular transponder.
Similarly, a transponder can miss a TWACS outbound message when it is preceded by another outbound message. Consecutive outbound messages can be sent on the same phase or different phases. If a transponder incorrectly synchronizes to the first outbound message (due to other noise sources) the transponder is more likely to miss the second outbound message as well.
This problem is compounded because once a transponder synchronizes to a bit pattern that matches the outbound preamble, the transponder stops looking for any other preamble patterns. It will be understood that the bit pattern detected could be incorrect as well as correct. As the transponder continues processing what it now believes is an outbound transmission based upon synchronization to an incorrect bit pattern, a blind spot (time period) is created in the transponder. If a true outbound message is transmitted on the phase of the transponder during this period, it will miss the message because it is not looking for it during that time. The blind spot may last anywhere from a few bytes of TWACS outbound message time (for the shortest valid message), up to the maximum message size of 31 bytes. This corresponds to a range in time of between 2.13 seconds and 16.50 seconds.
While inbound signals are a common source of false outbound preambles that cause the outbound detector to miss true outbound signals, the problem can also be triggered by power line noise. When no signals are present and the transponder is hunting for a preamble, there is a certain probability that any random noise sequence will match the outbound preamble pattern. Again, this may result in the transponder processing what it believes is the outbound message without further watching for a true outbound message.
The present disclosure is directed to improvements in a method of the detection of preamble patterns in TWACS outbound messages which benefit the likelihood of detecting a true TWACS outbound message. The first improvement includes matching some (or all) of the intermediate points in an outbound preamble waveform that occur between those bits currently being detected, in order to reduce the possibility of false synchronization and therefore decrease the probability of missing outbound messages. Tests have shown that this improvement significantly reduces the relative number of missed outbound messages.
Another approach is to utilize additional (2-8) buffers in a transponder for processing outbound messages concurrently, each buffer adding about 35 bytes of RAM each, while requiring a minimal amount of additional processing power. When an outbound message preamble is detected, the synchronization detector continues to search for additional outbound message preambles, and if additional preambles are detected, the associated bits are buffered using the additional buffers. The process continues until all bits associated with each message's preamble are collected. A cyclic redundancy check (CRC) is then performed to determine the validity of the collected bit pattern. Using this method significantly reduces the duration and frequency of any “blindness” of the transponder because the preamble searching continues until all buffers are full, even if an erroneous preamble is detected.
Other objects and features will be in part apparent and in part pointed out hereinafter.
The objects of the invention are achieved as set forth in the illustrative embodiments shown in the drawings which form a part of the specification.
The following detailed description illustrates the invention by way of example and not by way of limitation. This description clearly enables one skilled in the art to make and use the invention, and describes several embodiments, adaptations, variations, alternatives and uses of the invention, including what is presently believed to be the best mode of carrying out the invention. Additionally, it is to be understood that the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The invention is capable of other embodiments and of being practiced or carried out in various ways. Also, it will be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
The preamble of an outbound TWACS message consists of a 9-bit pattern 011100100, or 0E4 hexadecimal. The ones and zeroes are represented by putting a pulse on the first or third half cycle of the AC waveform near the zero crossing points. For a given outbound message all pulses are placed on either positive or negative half cycles. Accordingly, a TWACS outbound signal detector looks at all of the zero crossings. The following is a representative pulse pattern detected by a receiver. The top row is bit number; the middle row is the binary sequence; and, the bottom row is the pattern of pulses. A “1” represents the presence of a pulse and a “0” the absence thereof:
bit
1
2
3
4
5
6
7
8
9
binary
0
1
1
1
0
0
1
0
0
seq.
pulse pat.
1
0100
0100
0100
0001
0001
0100
0001
0001
It will be understood by those skilled in the art that the leading zeros of the first bit (bit 1) are ignored in the above representation. To remove the AC waveform from the signal being processed, the receiver subtracts data collected one cycle earlier in the processing sequence from the waveform currently being processed. This can be done as a filtering operation, using filter coefficients of [1, 0, −1]. The output of this operation, as performed over the entire preamble is:
If intermediate values are included in the received preamble sequence, what essentially is being accomplished is trying to match a ternary sequence of length 33 (ignoring the indeterminate part at the end). However, because the amplitude of the signal is not known in advance, an optimal threshold between what constitutes a 0 and a 1 or −1 can only be determined adaptively. A simplified test to do this, for example, would be to take only those points where a 1 or −1 is expected to occur. By only requiring a 9-bit pattern match, one is effectively only matching 9 points out of 33. But, by requiring all non-zero locations to also match, 13 points are now being matched instead. Were completely random noise being processed, this would result in a reduction in false synchronizations by a factor of 24 or 16. However, this is not necessarily true if the noise is caused by an inbound TWACS signal, which is not random.
Because inbound signals can easily be seen by the outbound detectors in transponders of the adjacent phases, it is important to be able to correctly reject patterns that may look similar to outbound message preambles, but are in fact part of inbound messages. After passing an inbound signal (or the sum of multiple inbound signals from multiple sources) through an outbound message filter, it is still possible for the result to match the non-zero portions of the preamble. However, because the pulse patterns in the inbound message signal are different from those in an outbound message, they contain non-zero information in places where the outbound message pattern should be zero. Therefore, a way of rejecting false synchronizations on inbound signals is to enforce some type of test on the other indices. One example of how to do this is to investigate the ratio of the signal energy level in places where a zero is expected to be, to the energy level in places where a one is expected. To define such a ratio, for the results of the filtering operation set forth above, let Z represent the set of indices that correspond to the places where there are expected values of zero; i.e.,
Now, if R exceeds a predetermined threshold value, it will be rejected as not a true outbound message preamble. Based upon the simulation results presented below, an acceptable range of threshold values is in the range of 0.6 to 1.0.
This new synchronization method was tested on simulated inbound and outbound message signals. The noise level selected was relatively high in order to simulate severe operating conditions. In addition, the outbound signals were subjected to an impulse response that created leakage into the next two half cycles of the waveform, with a 20% leakage after one half cycle, and an additional 10% leakage after two half cycles. These conditions resulted in a 3% probability of an outbound message signal being missed altogether. This value is higher than what is generally seen in practice.
The inbound waveforms were generated for all possible combinations for the 6 channels in the TWACS inbound channel scheme, and include 6 permutations of 1 channel, 15 permutations of 2 channels, 20 permutations of 3 channels, 15 permutations of 4 channels, 6 permutations of 5 channels, and one permutation for all 6 channels. This results in a total of 63 possible combinations.
With the threshold set to a relatively conservative value of 1.0, the probability of falsely rejecting an outbound message was 0.1%. It will be noted that, at this noise level, the probability of missing a preamble due to just noise is 17%. At this level, only 6% of the places in inbound messages that would have been detected using traditional synchronization methods were able to pass both the 13-point pattern match and the zero/non-zero ratio test. With the noise level set so that existing detection methods missed 3% of outbound preambles, the probability of falsely rejecting an outbound message was reduced to 0.01%, and the inbound message acceptance percentage increased to 5%. This is a reduction, by a factor of 20, in the number of false preamble patterns that are accepted. The remaining false alarms can be substantially eliminated by use of a second detector; or, if resources do not permit, the threshold could be reduced to, for example, 0.9.
This false preamble rejection method has some elements that require substantially more memory than has been used in the past, which could make implementation in some transponders impractical. The main problem in this regard is that the ratio test to determine whether or not to reject a possible preamble is essentially a ratio of the outputs of two finite impulse response (FIR) filters. Implementing such filters requires that data be stored in a memory for the entire length of a filter, about 35 half-cycles. Since these filters are replicated several times in the transponder, each additional past value that must be stored for the filter results in a large increase in memory consumption.
Currently, average signal amplitude is computed for each of the four possible synchronization points using a first-order recursive filter which is updated at each step using the running average of previously entered values, plus the next new value. The averages are used to create a modified zero to non-zero ratio test. For example, let xn represent the input to the filter at half-cycle n. At each n, there are four filter outputs, yn,1, yn,2, yn,3, and yn,4. These represent the filtered outputs for the four synchronization points illustrated in
which is similar to the original definition of R in Equation (1) above, except that because some terms in both the numerator and denominator from the original definition are contained in yn,3, it is removed completely from the approximation in Equation (2).
In practice, computing the filter outputs yn,1 . . . yn,4 as unweighted averages of previous inputs requires significant additional memory, so recursive averages can be used as an approximation. A simple first-order recursive average does not require any additional memory beyond the storage of the y values as
yn=xn+αyn−1. (3)
The value of α is an averaging constant that should be chosen to optimize rejection of false synchronization patterns. If it is now assumed that at half-cycle n, the 13-point pattern match is satisfied, then either the zero/non-zero amplitude ratio (Equation 1) or the approximate zero/non-zero amplitude ratio (Equation 2) is computed and compared to a predetermined threshold, in order to judge the likelihood that the received pattern actually represents an outbound preamble.
It should be noted that equation (1) represents an ideal case which requires extra memory, and equation (2) represents a simplified case which requires no extra memory. These examples are intended to be illustrative only, and not limiting. For example, in a situation where some additional memory is available, but not enough to implement equation (1), a different filtering operation than that illustrated in equation (3) could be implemented that uses additional internal filter states to more closely approximate the filter response of equation (1).
One problem encountered using IIR filtering is that due to its infinite impulse response, the output of the filter will include past results that are older than the synchronization sequence. In
Simulation results for the modified zero/non-zero ratio test are shown in
One reason for sub-optimal performance of the reduced-memory modifications to the false preamble rejection is that non-zero intermediate values observed at synchronization point 3 (yn,3) in
In summary, a received signal is assumed to be a valid synchronization pattern when the following criteria are satisfied:
When a TWACS outbound message occurs on a different phase of the AC power line, the situation is referred to as “outbound crosstalk”. Currently, transponders accept the outbound message rather than block it, because they cannot determine the difference between a TWACS outbound message on a different phase and a message on their own phase. If a transponder detects an outbound message that is actually crosstalk, it currently stops looking for another valid preamble in the outbound message for the calculated inbound message time period. If the TWACS' communication equipment (SCE) sends an outbound message on the same phase, that signal will be missed because the transponder is “blind” during the inbound message time period on the adjacent phase.
Since a basic problem is that many transponders are designed (or programmed) to stop searching for a new preamble pattern in an outbound message once a preamble pattern is found, another solution to the problem is to program the transponder to continue searching for preamble patterns even after one has been found. As discussed above, detectors in current transponders stop searching for a preamble pattern once one is found because the transponder has a limited amount of memory, and there is a limited amount of processing power available to the microprocessors used in the transponders. With the introduction of newer transponders having more powerful microprocessors, more memory, and greater processing speed, these limitations are relaxed.
Current outbound detectors employ a set of tables to track detected outbound message bits for fourteen (14) different detection ranges across four (4) different possible half-cycle alignments. Each bit of an outbound message signal is coded using four (4) consecutive half cycles of the AC waveform, which results in four (4) different frames of reference on which an outbound message OM can be found, so the detector must track each of the four (4) frames of reference. For each half cycle of the waveform, only one of the four (4) frames of reference is evaluated, so the bit rate for each frame of reference is one (1) bit for four (4) half cycles.
The tables also track the preceding eight (8) bits of a signal, both as to whether the bits appear as a 1 or a 0, as well as the signal strength of each bit. A 1 in the map indicates a signal strength greater, for example, than a threshold value of 25 μsec; while, a zero indicates a signal strength below this threshold. The tables also track a running average of the bits. In this regard, the signal strength of each bit is added to the average signal strength of the preceding bits, and the resulting sum is then divided by 2. This is done for all the ranges. When an outbound preamble is detected on one or more of the ranges for the frame of reference which is being evaluated for that particular half cycle, then processing for that frame of reference is halted. The detection range having the greatest running average signal strength is now selected as the best range, and from there on, for the remainder of the outbound message signal, only data for that range and frame of reference is calculated. If the signal strength for a bit is positive, it is detected as a 0; if the signal strength for that bit is negative, it is detected as a 1. The bits are then shifted into an outbound message buffer of the transponder until the number of bits specified in the outbound length portion of the message have all been detected. As each bit of the outbound message is detected, the detector then uses that information to determine how many more bits need to be received before attempting to validate the message using a CRC check code in order to generate a checksum for the outbound message used to detect errors in the message.
Using the method of the invention, no additional tables are needed and the transponders need only to continue searching for a preamble on all 14 ranges and on all 4 frames of reference. Several additional outbound message buffers are now used and these will require additional variables to describe what they are. One thing that will need to be known is on which frame of reference an outbound message preamble was detected for a buffer. Another thing that will need to be known is the detection range on which the outbound message preamble was detected. When enough of the message has been received to know the length of the outbound message, that information will be used to determine when to perform the CRC validation on that buffer. Another item required is a bit counter used to keep track of where the next detected bit goes.
Preferably, 4-8 outbound message buffers are required, with each buffer only adding about 35 bytes of RAM. The additional processing power required by the additional buffers to detect outbound is minimal. Each half cycle only requires storing a bit into as many buffers as are active for that frame of reference, and only the outbound message buffers for the current frame of reference need be managed. However, even if all 8 buffers were active for the same frame of reference, each buffer only needs to have the bit inserted into the buffer, and the bit count of the buffer updated. The process continues until all bits specified to be sent, based on the extracted outbound message length information, are received. Then, the CRC is evaluated for the message. It is important that calculation of the CRC not impact other processing which is on-going, so the searching for outbound preambles continues. Since the CRC check process is time consuming, it is done as each bit is received, instead of all at once after the last bit is detected. This increase in processing is proportional to the number of detectors.
Use of this method will significantly reduce the likelihood of TWACS inbound messages being detected as outbound preambles, with the resulting “blindness” of the transponder as previously described. It will also make the transponders more resistant to certain types of noise which currently cause it to detect an outbound preamble when there is none, and subsequently miss a valid outbound message. The changes required to affect this are relatively minimal, since all that needs to be selected is the number of additional outbound message buffers to be maintained. The number of additional buffers could even be variable and so allow a higher number of buffers to be used in transponders having a higher processing capability; with a fewer number being used the lower powered, slower speed units.
In view of the above, it will be seen that the several objects and advantages of the present disclosure have been achieved and other advantageous results have been obtained.
Hessling, Jr., John B., Davis, William J., Rieken, David W., Hammond, Benjamin A., Spencer, Quentin H., Kelley, Dennis L., Walker, II, Michael R.
Patent | Priority | Assignee | Title |
8761271, | Feb 28 2011 | ACLARA TECHNOLOGIES LLC | Simultaneous detection of communications signals on all phases of a multi-phase power distribution network |
9906270, | Mar 26 2015 | ACLARA TECHNOLOGIES LLC | Concurrent outbound communications in a TWACS |
Patent | Priority | Assignee | Title |
5903594, | Apr 16 1997 | General Electric Company | Power line communications spread spectrum protocol |
6278357, | Feb 04 1999 | Electric Power Research Institute, Inc | Apparatus and method for implementing digital communications on a power line |
6671311, | Jun 20 1997 | Yitran Communications LTD | Receiver for use in a code shift keying spread spectrum communications system |
7881607, | Apr 05 2006 | TELLABS PETALUMA, INC | Methods and apparatus for identifying a passive optical network failure |
20050105505, | |||
20060251069, | |||
20070217493, | |||
20080008153, | |||
20090022081, | |||
20090132650, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 18 2008 | Aclara Power-Line Systems, Inc. | (assignment on the face of the patent) | / | |||
Jan 13 2010 | RIEKEN, DAVID W | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Jan 13 2010 | SPENCER, QUENTIN H | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Jan 14 2010 | WALKER, MICHAEL R , II | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Jan 15 2010 | KELLEY, DENNIS L | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Jan 15 2010 | HAMMOND, BENJAMIN A | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Jan 19 2010 | DAVIS, WILLIAM J | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Feb 05 2010 | HESSLING, JOHN B , JR | ACLARA POWER-LINE SYSTEMS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023914 | /0478 | |
Dec 31 2011 | ACLARA POWER-LINE SYSTEMS INC | ACLARA TECHNOLOGIES LLC | MERGER SEE DOCUMENT FOR DETAILS | 032089 | /0478 | |
Mar 28 2014 | ACLARA TECHNOLOGIES LLC | CERBERUS BUSINESS FINANCE, LLC, AS AGENT | PATENT SECURITY AGREEMENT | 032554 | /0912 | |
Mar 28 2014 | ACLARA TECHNOLOGIES LLC | BMO HARRIS BANK N A | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 032608 | /0055 | |
Apr 18 2014 | ACLARA TECHNOLOGIES LLC | PNC Bank, National Association | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 032712 | /0931 | |
Apr 18 2014 | METER READINGS HOLDING, LLC | PNC Bank, National Association | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 032712 | /0931 | |
Apr 18 2014 | ACLARA INTERNATIONAL LLC | PNC Bank, National Association | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 032712 | /0931 | |
Apr 18 2014 | BMO HARRIS BANK, N A | Aclara Technologies, LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 032715 | /0461 | |
Aug 29 2016 | CERBERUS BUSINESS FINANCE, LLC | ACLARA METERS LLC F K A MRH METERS LLC | RELEASE OF SECURITY INTEREST IN PATENTS | 039880 | /0908 | |
Aug 29 2016 | CERBERUS BUSINESS FINANCE, LLC | ACLARA TECHNOLOGIES LLC | RELEASE OF SECURITY INTEREST IN PATENTS | 039880 | /0908 | |
Aug 29 2016 | ACLARA TECHNOLOGIES LLC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | SECURITY AGREEMENT | 039872 | /0227 | |
Aug 29 2016 | Aclara Meters LLC | MORGAN STANLEY SENIOR FUNDING, INC , AS COLLATERAL AGENT | SECURITY AGREEMENT | 039872 | /0227 | |
Feb 02 2018 | PNC Bank, National Association | ACLARA TECHNOLOGIES LLC | TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT | 045502 | /0776 | |
Feb 02 2018 | MORGAN STANLEY SENIOR FUNDING, INC | ACLARA TECHNOLOGIES LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 045245 | /0231 | |
Feb 02 2018 | MORGAN STANLEY SENIOR FUNDING, INC | Aclara Meters LLC | RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS | 045245 | /0231 |
Date | Maintenance Fee Events |
Mar 24 2017 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Mar 10 2021 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Sep 24 2016 | 4 years fee payment window open |
Mar 24 2017 | 6 months grace period start (w surcharge) |
Sep 24 2017 | patent expiry (for year 4) |
Sep 24 2019 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 24 2020 | 8 years fee payment window open |
Mar 24 2021 | 6 months grace period start (w surcharge) |
Sep 24 2021 | patent expiry (for year 8) |
Sep 24 2023 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 24 2024 | 12 years fee payment window open |
Mar 24 2025 | 6 months grace period start (w surcharge) |
Sep 24 2025 | patent expiry (for year 12) |
Sep 24 2027 | 2 years to revive unintentionally abandoned end. (for year 12) |